Progress Acquires MarkLogic! Learn More
BLOG ARTICLE

MarkLogic Security Workshop – Coming to a City Near You

Back to blog
10.20.2017
2 minute read
Back to blog
10.20.2017
2 minute read

Another day, another security breach.

At least that’s what it feels like lately. The attacks take many different shapes and forms. From the high profile, massive scale breaches of consumer credit data to the theft of mobile phone user data. And no organization is immune. There have even been ransomware attacks on fuzzy talking teddy bears Teddy bears!!

As business leaders and technologists we are challenged each day to make decisions and implement systems that place security as a top priority. Doing so reduces risk and protects our customers and business. But we’re also faced with intense pressure to deliver new applications and data services faster than ever before.

Fortunately, time to market and information security don’t need to be at odds with one another.
Customers choose NoSQL technology because of the agility, flexibility, scalability and speed it provides.

And you have chosen MarkLogic NoSQL because of its enterprise capabilities and proven, certified security model. In this FREE workshop, you will learn hands-on how to use MarkLogic to implement security inside the database. You will also get to hear from industry leaders to gain insight into real-world examples of security concepts in action.


Why You Need to Attend

What you will learn: Why it is important:
How to design and implement role-based access control to secure information in the database. Users should be given access to the least amount of information that is needed in order for them to do their jobs. By implementing roles and permissions you can be restrictive, but also flexible, so that you create a model that is easy to manage over time.
How to control access to data on a granular level Some people need access to certain bits of information but not to other bits. Information within the database can be protected at the XML element or JSON property level. This enables you to restrict user access to certain parts of a document – or to prevent a user from even knowing that those parts exist.
How to implement encryption. External hackers aren’t the only threat. There is also the threat from internal sources. How do you protect against a rogue DBA or system administrator? Encryption enables you to encrypt the data in the database (including logs and configuration files). Key management to the encrypted data enables you to limit the power of an individual, so that even if someone with access to the disk was to steal data and take it offsite, they couldn’t use that data without the keys.

Hurry! Spaces Are Limited — Register Today!

Share this article

Read More

Related Posts

Like what you just read, here are a few more articles for you to check out or you can visit our blog overview page to see more.

Community

CEO Reflections on Juneteeth

Update on employee engagement during the pandemic, and the work of our DE&I team.

All Blog Articles
Community

What You’ll Learn at MarkLogic World 2020

Find out who will be presenting at our first-ever virtual MarkLogic World, and what they’ll be covering.

All Blog Articles
Community

MarkLogic World 2020: Integrate to innovate – and to respond to COVID-19

Learn how we’re taking MarkLogic World virtual this year, and how you can participate – from keynotes to breakout sessions, training and more.

All Blog Articles

Sign up for a Demo

Don’t waste time stitching together components. MarkLogic combines the power of a multi-model database, search, and semantic AI technology in a single platform with mastering, metadata management, government-grade security and more.

Request a Demo